| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121 | 
							- services:
 
-   # The postgres database.
 
-   db:
 
-     image: postgres:15-alpine
 
-     restart: always
 
-     env_file:
 
-       - ./middleware.env
 
-     environment:
 
-       POSTGRES_PASSWORD: ${POSTGRES_PASSWORD:-difyai123456}
 
-       POSTGRES_DB: ${POSTGRES_DB:-dify}
 
-       PGDATA: ${PGDATA:-/var/lib/postgresql/data/pgdata}
 
-     command: >
 
-       postgres -c 'max_connections=${POSTGRES_MAX_CONNECTIONS:-100}'
 
-                -c 'shared_buffers=${POSTGRES_SHARED_BUFFERS:-128MB}'
 
-                -c 'work_mem=${POSTGRES_WORK_MEM:-4MB}'
 
-                -c 'maintenance_work_mem=${POSTGRES_MAINTENANCE_WORK_MEM:-64MB}'
 
-                -c 'effective_cache_size=${POSTGRES_EFFECTIVE_CACHE_SIZE:-4096MB}'
 
-     volumes:
 
-       - ${PGDATA_HOST_VOLUME:-./volumes/db/data}:/var/lib/postgresql/data
 
-     ports:
 
-       - "${EXPOSE_POSTGRES_PORT:-5432}:5432"
 
-     healthcheck:
 
-       test: [ "CMD", "pg_isready" ]
 
-       interval: 1s
 
-       timeout: 3s
 
-       retries: 30
 
-   # The redis cache.
 
-   redis:
 
-     image: redis:6-alpine
 
-     restart: always
 
-     volumes:
 
-       # Mount the redis data directory to the container.
 
-       - ${REDIS_HOST_VOLUME:-./volumes/redis/data}:/data
 
-     # Set the redis password when startup redis server.
 
-     command: redis-server --requirepass difyai123456
 
-     ports:
 
-       - "${EXPOSE_REDIS_PORT:-6379}:6379"
 
-     healthcheck:
 
-       test: [ "CMD", "redis-cli", "ping" ]
 
-   # The DifySandbox
 
-   sandbox:
 
-     image: langgenius/dify-sandbox:0.2.10
 
-     restart: always
 
-     environment:
 
-       # The DifySandbox configurations
 
-       # Make sure you are changing this key for your deployment with a strong key.
 
-       # You can generate a strong key using `openssl rand -base64 42`.
 
-       API_KEY: ${SANDBOX_API_KEY:-dify-sandbox}
 
-       GIN_MODE: ${SANDBOX_GIN_MODE:-release}
 
-       WORKER_TIMEOUT: ${SANDBOX_WORKER_TIMEOUT:-15}
 
-       ENABLE_NETWORK: ${SANDBOX_ENABLE_NETWORK:-true}
 
-       HTTP_PROXY: ${SANDBOX_HTTP_PROXY:-http://ssrf_proxy:3128}
 
-       HTTPS_PROXY: ${SANDBOX_HTTPS_PROXY:-http://ssrf_proxy:3128}
 
-       SANDBOX_PORT: ${SANDBOX_PORT:-8194}
 
-     volumes:
 
-       - ./volumes/sandbox/dependencies:/dependencies
 
-       - ./volumes/sandbox/conf:/conf
 
-     healthcheck:
 
-       test: [ "CMD", "curl", "-f", "http://localhost:8194/health" ]
 
-     networks:
 
-       - ssrf_proxy_network
 
-   # ssrf_proxy server
 
-   # for more information, please refer to
 
-   # https://docs.dify.ai/learn-more/faq/install-faq#id-18.-why-is-ssrf_proxy-needed
 
-   ssrf_proxy:
 
-     image: ubuntu/squid:latest
 
-     restart: always
 
-     volumes:
 
-       - ./ssrf_proxy/squid.conf.template:/etc/squid/squid.conf.template
 
-       - ./ssrf_proxy/docker-entrypoint.sh:/docker-entrypoint-mount.sh
 
-     entrypoint: [ "sh", "-c", "cp /docker-entrypoint-mount.sh /docker-entrypoint.sh && sed -i 's/\r$$//' /docker-entrypoint.sh && chmod +x /docker-entrypoint.sh && /docker-entrypoint.sh" ]
 
-     environment:
 
-       # pls clearly modify the squid env vars to fit your network environment.
 
-       HTTP_PORT: ${SSRF_HTTP_PORT:-3128}
 
-       COREDUMP_DIR: ${SSRF_COREDUMP_DIR:-/var/spool/squid}
 
-       REVERSE_PROXY_PORT: ${SSRF_REVERSE_PROXY_PORT:-8194}
 
-       SANDBOX_HOST: ${SSRF_SANDBOX_HOST:-sandbox}
 
-       SANDBOX_PORT: ${SANDBOX_PORT:-8194}
 
-     ports:
 
-       - "${EXPOSE_SSRF_PROXY_PORT:-3128}:${SSRF_HTTP_PORT:-3128}"
 
-       - "${EXPOSE_SANDBOX_PORT:-8194}:${SANDBOX_PORT:-8194}"
 
-     networks:
 
-       - ssrf_proxy_network
 
-       - default
 
-   # The Weaviate vector store.
 
-   weaviate:
 
-     image: semitechnologies/weaviate:1.19.0
 
-     profiles:
 
-       - ""
 
-       - weaviate
 
-     restart: always
 
-     volumes:
 
-       # Mount the Weaviate data directory to the container.
 
-       - ${WEAVIATE_HOST_VOLUME:-./volumes/weaviate}:/var/lib/weaviate
 
-     env_file:
 
-       - ./middleware.env
 
-     environment:
 
-       # The Weaviate configurations
 
-       # You can refer to the [Weaviate](https://weaviate.io/developers/weaviate/config-refs/env-vars) documentation for more information.
 
-       PERSISTENCE_DATA_PATH: ${WEAVIATE_PERSISTENCE_DATA_PATH:-/var/lib/weaviate}
 
-       QUERY_DEFAULTS_LIMIT: ${WEAVIATE_QUERY_DEFAULTS_LIMIT:-25}
 
-       AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED: ${WEAVIATE_AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED:-false}
 
-       DEFAULT_VECTORIZER_MODULE: ${WEAVIATE_DEFAULT_VECTORIZER_MODULE:-none}
 
-       CLUSTER_HOSTNAME: ${WEAVIATE_CLUSTER_HOSTNAME:-node1}
 
-       AUTHENTICATION_APIKEY_ENABLED: ${WEAVIATE_AUTHENTICATION_APIKEY_ENABLED:-true}
 
-       AUTHENTICATION_APIKEY_ALLOWED_KEYS: ${WEAVIATE_AUTHENTICATION_APIKEY_ALLOWED_KEYS:-WVF5YThaHlkYwhGUSmCRgsX3tD5ngdN8pkih}
 
-       AUTHENTICATION_APIKEY_USERS: ${WEAVIATE_AUTHENTICATION_APIKEY_USERS:-hello@dify.ai}
 
-       AUTHORIZATION_ADMINLIST_ENABLED: ${WEAVIATE_AUTHORIZATION_ADMINLIST_ENABLED:-true}
 
-       AUTHORIZATION_ADMINLIST_USERS: ${WEAVIATE_AUTHORIZATION_ADMINLIST_USERS:-hello@dify.ai}
 
-     ports:
 
-       - "${EXPOSE_WEAVIATE_PORT:-8080}:8080"
 
- networks:
 
-   # create a network between sandbox, api and ssrf_proxy, and can not access outside.
 
-   ssrf_proxy_network:
 
-     driver: bridge
 
-     internal: true
 
 
  |